For each observed error, we create controls in the CA software to prevent the occurrence of these errors, in addition we are subordinate to a ROOT CA that is also pointed out about errors in our certificates. We work with CAB lint to monitor the issued certificates.
Em quinta-feira, 17 de novembro de 2022 às 14:21:37 UTC-3, [email protected] escreveu: > On Thu, Nov 17, 2022 at 9:02 AM Lucia Castelli <[email protected]> > wrote: > >> Indeed, in the beginning we had many certificates issued erroneously and >> we started to monitor these certificates to eliminate such errors. >> We believe that they are errors that any CA can have and that makes the >> process of revoking and replacing certificates, as with any other CA, that >> is already in the root program of Mozilla or any other root program. >> > > Mistakes do happen, but there are simple technical mechanisms that an > issuer can implement to prevent this particular mistake. > > >> Daily we receive emails from bugzilla where we can see many certificates >> issued by major competitors CA with errors. >> We believe that there is no CA that is ready and mature to not make >> mistakes when starting to operate in these issuing. >> We have been trying to submit to this program for more than 2 years and >> we are always attentive and making efforts to do our best within compliance. >> > > What have you done to make sure this doesn't happen again? > > Do you have an incident remediation process? Can you share any remediation > & response artifacts (e.g., postmortems)? > > Mike > > -- You received this message because you are subscribed to the Google Groups "public" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/dc6a28f4-0a68-4a94-bbec-266e3fd31d9dn%40ccadb.org.
